Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for attack cybersecurity
attack
x
cybersecurity
x
49 search results found
Payloads
⭐
3,289
Git All the Payloads! A collection of web attack payloads.
Apt_report
⭐
2,078
Interesting APT Report Collection And Some Special IOC
Hayabusa
⭐
1,800
Hayabusa (隼) is a sigma-based threat hunting and fast forensics timeline generator for Windows event logs.
Attack Navigator
⭐
1,791
Web app that provides basic navigation and annotation of ATT&CK matrices
Xxe Injection Payload List
⭐
825
🎯 XML External Entity (XXE) Injection Payload List
Awesome Cybersecurity Datasets
⭐
765
A curated list of amazingly awesome Cybersecurity datasets
Thephish
⭐
653
ThePhish: an automated phishing email analysis tool
Functionstomping
⭐
643
A new shellcode injection technique. Given as C++ header, standalone Rust program or library.
Opensquat
⭐
576
The openSquat project is an open-source solution for detecting phishing domains and domain squatting. It searches for newly registered domains that impersonate legitimate domains on a daily basis.
Hack A Sat Library
⭐
549
Public library of space documents and tutorials
Jwtcat
⭐
258
A CPU-based JSON Web Token (JWT) cracker and - to some extent - scanner.
Falcongate
⭐
255
A smart gateway to stop cyber criminals - Sponsored by Falcon Guard
Attack Stix Data
⭐
254
STIX data representing MITRE ATT&CK
Ccat
⭐
238
Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.
Attacks On Tor
⭐
202
Thirteen Years of Tor Attacks
Mrkaplan
⭐
200
MrKaplan is a tool aimed to help red teamers to stay hidden by clearing evidence of execution.
Xsscope
⭐
157
XSScope is one of the most powerful and advanced GUI Framework for Modern Browser exploitation via XSS.
Kali Linux Tools Interface
⭐
141
Graphical Web interface developed to facilitate the use of security information tools.
Url Obfuscator
⭐
120
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Awesome Ddos Tools
⭐
115
Collection of several DDos tools.
Slowloris
⭐
89
Asynchronous Python implementation of SlowLoris DoS attack
Caldera_pathfinder
⭐
84
Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translating those scans into adversaries for network traversal.
Awesome Wifi Security
⭐
79
A collection of awesome resources related to 802.11 security, tools and other things
Suwtheh
⭐
72
Learning by Practising - Hack & Detect - A Practical Guide to Hacking and its Detection via network forensics
Awesome Security Articles
⭐
34
This repository contains links to awesome security articles.
Cve 2018 4407
⭐
29
IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]
Tsuki Sploit
⭐
24
A USB-based script for Ethical hacking with multiple attacks
Wordlist Generator
⭐
24
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
Squatm3
⭐
23
Squatm3 is a python tool designed to enumerate available domains generated modifying the original domain name through different techniques
Complete_cybersecurity_path
⭐
22
the open source way to do the excercises to be a Full-Stack Cybersecurity Engineer. added with the recent paper in the field of Machine learning and cybersecurity. for more info about theis path :- https://www.sans.org/cyber-security-skills-roadmap
Cloak And Dagger
⭐
19
An overlay attack example
Ddos
⭐
17
Simple dos attack utility
Cerberus
⭐
17
Cerberus is another simple stressing tool simulating DDoS attacks.
Lockphish
⭐
16
Lockphish it's the first tool (07/04/2020) for phishing attacks on the lock screen, designed to grab Windows credentials, Android PIN and iPhone Passcode using a https link.
Cs259d_notes_hw
⭐
14
The notes are the supplement to papers and handouts of CS 259D
R00tz2017
⭐
13
An Intro to Penetration Testing Workshop
Adv Dnn Ens Malware
⭐
13
adversarial examples, adversarial malware examples, adversarial malware detection, adversarial deep ensemble, Android malware variants
Attckr
⭐
13
⚔️MITRE ATT&CK Machinations in R
Comptia Security Sy0 501 Study Guide
⭐
12
Study Guide for CompTIA Security+ SY0 501 exam
Container Security
⭐
11
Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides
Fdia Pdm
⭐
10
False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics
Sqli Detector In Python
⭐
10
python based sqli detector tool
Mulval
⭐
9
MulVAL is an cybersecurity reasoning engine that can be applied on top of multiple contexts (cloud, IoT, enterprise network, etc )
Cstorm Windows Startup Virus In C
⭐
9
An opensource Prank Startup Malware for windows developed using C Programming Language.
Covid 19 Cti
⭐
9
A collection of Covid-19 related threat intelligence and resources.
Cdas
⭐
8
This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attack execution, and cybersecurity policy analysis.
Cyberattack Detection
⭐
8
Cyber Attack Detection thanks to Machine Learning Algorithms
Vulnerability Testing Solutions
⭐
8
Website for testing and preventing different attacks like XSS, SQL Injection & Spoofing for Nasscom (ISAA) Project.
Hassankit_target_detection
⭐
8
This script validates if any queried domain/user is contained as a target within the HassanKit Phishing Campaign
Canvass
⭐
6
An open source tool chain to simulate cyber attacks in the power system
Buffer Overflow
⭐
6
These are the scripts & methodologies that can be used in Buffer Over Flow Fuzzing and Exploitation
Hacking With Python
⭐
6
You guessed well, genius !! This tool is intended for the initiation to ethical hacking with python
Spectre_meltdown
⭐
6
Meltdown and Spectre : CPU vulnerabilities — Explained and Exploited
Attackmate
⭐
5
AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.
Security Resources
⭐
5
Archive of Security Resources - Trainings, meetups, Links
Intro To Ethical Hacking
⭐
5
Dec 28th @ in5 - Introduction to Ethical Hacking and Cyber Security. At this session, we went over the basics of cybersecurity and showed how you can protect yourself from some common attacks. Using Kali Linux as a platform, we isolated exploits and recreate some of the more common major attacks (eg; ‘Man-In-The-Middle’) using a variety of penetration testing tools such as the Browser Exploitation Framework, also showed how to inoculate your systems against each malicious action.
Apache Http Logs
⭐
5
to detect vulnerability scans, XSS and SQLI attacks, examine access log files for detections.
Related Searches
Python Attack (2,321)
Javascript Attack (693)
Attack Adversarial (590)
Python Cybersecurity (583)
Security Attack (536)
C Attack (491)
Java Attack (408)
Security Cybersecurity (402)
1-49 of 49 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.